General

  • Target

    03e9eb0a1e1e7ad7a9f47da384da6237671037250e24c37d8bb9fdc4c5c7983f

  • Size

    176KB

  • Sample

    220212-nrb24abgg7

  • MD5

    3d66e584157583e745584462cafd70da

  • SHA1

    6db3ecbf863469c0f9c0484156c702cb9ca2a023

  • SHA256

    03e9eb0a1e1e7ad7a9f47da384da6237671037250e24c37d8bb9fdc4c5c7983f

  • SHA512

    93c1740d3915a77e6afcf20c07762741e22aa07dbb6245b9ddb329932cfbb203da45273783c5a539b402e7607cda73cbb81d32b84093b126691fc1a8e5cf5017

Malware Config

Targets

    • Target

      03e9eb0a1e1e7ad7a9f47da384da6237671037250e24c37d8bb9fdc4c5c7983f

    • Size

      176KB

    • MD5

      3d66e584157583e745584462cafd70da

    • SHA1

      6db3ecbf863469c0f9c0484156c702cb9ca2a023

    • SHA256

      03e9eb0a1e1e7ad7a9f47da384da6237671037250e24c37d8bb9fdc4c5c7983f

    • SHA512

      93c1740d3915a77e6afcf20c07762741e22aa07dbb6245b9ddb329932cfbb203da45273783c5a539b402e7607cda73cbb81d32b84093b126691fc1a8e5cf5017

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks